an apoligy

Im very sorry for laming pheonix cibbicom and solidsnake......and i ask that you accept my apoligy.....and i apologise greatly for lagging the server and insulting pheonix hora and hektor...and im just so very sorry dont kick me from ATS

Last edited by Battledroidlover on Sat 06 Feb 2010, 7:56 pm; edited 1 time in total

It doesn't prove it, but the chances of someone acquiring and then spoofing BDL's IP address are extremely slim. There are lots of systems over the internet designed to prevent this possibility and packet manipulation of this sort is typically only seen in much more advanced situations like DoS attacks. Also, his use of that IP address was limited to at most a few days, which is a small amount of time for someone to prepare an advanced spoof like this.

Well BDL might as well accept that he has been busted and that he did lag the server, because from what nick is saying not only was there limited window of time to plan such a spoof, but its also a complex and time consuming job to emulte his i.p address and for such a petty crime it just wouldnt be worth the bother, even from the most skilled and ATS hating individual.

Basically from what nick has said, there is more chance of me going to the toliet and shitting out three cats, than there is somebody of somebody emulating BDL's i.p in the small timeframe that it was available, and then using it to lag a jk2 server.

I don't hack myself, so I can't give you specifics. I just know that most internet hardware is designed to not accept packets with IP header source addresses not on the network from which the packet originated, and given the small amount of time I find the chances of someone on JK2 doing this pretty small. Perhaps more likely than shitting out three cats, but so small that BDL is [within a much more than reasonable doubt] busted.

Im mean surely (i dont know that much about this stuff) there is just as much chance of a random somebody imatating your i.p address and using it for other very evil perposes such as identity theft, or child pornograph ect, as there is for somebody from JK2 to emulate you i.p and use it for something as petty as lagging a server? (like i said i dont know much the ins and outs of networks and servers)

Plus in the BDL on the server also had all of BDL's binds so unless the binds are transfered with i.p address than the person would also have to monitor BDL to research him. It seems not only very unlikely but just not worth the effort for such a small result on their part.

So i think we can all confirm that BDL was the assailant of the server lagging, his apology is null and void and we must now consider what consequences we must impose on him.

I've been thinking about it some more, and the only way somebody could spoof his IP address is if they actually had that IP address, so it wouldn't really be spoofing. The person would have to legitimately figure out his IP address, and then take that address from him on the network, because otherwise packets wouldn't be sent back to the impersonator so he wouldn't be able to maintain any connection. Basically if somebody's spoofing, they can't get any data back, they can only send data (which means that's definitely not what this person was doing, since they were able to play JK2). And the chances of somebody knowing BDL's IP and being able to get it are very small, especially considering the IP is a host on a United Kingdom ISP and so its assignment is only given to someone if the ISP's hardware decides to do so.

Packets are the data unit of network transmissions. There are source and destination IP addresses in the header of an IPv4 packet, and if someone has a program that constantly modifies the source IP address header information, all packets received from that person would appear to come from whatever IP address they want, although there are a number of methods that routers use across the internet to limit the ability to do this. If someone spoofs an IP address by modifying the source IP address of their packets, the recipient will have only that fake IP address to respond to, and so no data will be sent back to the hacker because his actual IP address is required as the destination IP address in the header of packets sent from the server if he wants to receive data back and maintain a connection. Since this person was playing JK2, they had a connection, and so their actual IP address was being used.

Basically, IP address spoofing is only useful to flood a server with too many requests during a DoS attack, because the only thing that matters is sending data; you don't need to receive any data back.

Last edited by NickdeClaw on Sat 06 Feb 2010, 11:36 am; edited 1 time in total